gw-world:/> show LDAPDatabase
LDAP Authentication and PPP
When using a PPP based client for PPTP or L2TP access, special consideration has to be taken if
LDAP authentication is to succeed with CHAP, MS-CHAPv1 or MS-CHAPv2.
A. Normal LDAP Authentication
Normal LDAP authentication for Webauth, XAuth, or PPP with PAP security is illustrated in the
diagram below. An authentication bind request with the username and password is sent to the LDAP
server which then performs the authentication and sends back a bind response with the result.
Figure 8.1. Normal LDAP Authentication
The processing is different if a group membership is being retrieved since a request is sent to the
LDAP server to search for memberships and any group memberships are then sent back in a
response.
B. PPP Authentication with CHAP, MS-CHAPv1 or MS-CHAPv2
If CHAP, MS-CHAPv1 or MS-CHAPv2 are used for logon security, a digest of the user's password
will be sent to the D-Link Firewall by the client. To check the validity of this password,
NetDefendOS would theoretically need to retrieve the password or password digest from the LDAP
server. However, LDAP doesn't support either.
To solve the password authentication problem, an optional Password Attribute field needs to be
configured when configuring the LDAP server in NetDefendOS. This field must be different from
the default password attribute (this is userPassword in most LDAP databases). This may mean that
an update to the LDAP server database schema will also be required to add this new field. The
alternative to schema alteration is to use another unused field that was intended for another purpose.
When NetDefendOS receives the password digest from the client, it then initiates a Search Request
to the LDAP server. The server replies with a Search Response which contains the user's password
and any group memberships. NetDefendOS is then able to create a digest of the password to
compare with the digest sent by the client. A successful digest match then results in successful
authentication.
The essential difference with the normal event sequence in A above is that it is the D-Link Firewall
itself which is performing the authentication.
8.2.4. External LDAP Servers
Chapter 8. User Authentication
308
Summary of Contents for DFL-210 - NetDefend - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449...